| Sector | Typical Application | Real‑world example |
|---|---|---|
| Education | Virtual classrooms, LMS, digital assessment | Google Classroom delivering assignments |
| Business | e‑Commerce, POS, CRM, ERP | Online shop (Shopify) + inventory system |
| Banking & Finance | Online banking, ATMs, fraud‑detection systems | ATM cash‑withdrawal workflow |
| Health | Telemedicine, electronic patient records | Video consultation via NHS App |
| Government | e‑Government services, digital IDs, online tax filing | HMRC online self‑assessment |
| Retail | Barcode scanners, stock‑control, self‑checkout | Supermarket self‑service tills |
| Transportation | GPS tracking, ticketing, traffic‑management | Real‑time bus arrival apps |
| Entertainment | Streaming, online gaming, digital publishing | Netflix video‑on‑demand |
| Legislation | Key Requirement | Relevance to Students |
|---|---|---|
| General Data Protection Regulation (GDPR) | Personal data must be processed lawfully, fairly and transparently; individuals have the right to access, correct and delete their data. | Obtain consent before posting photos of classmates; delete data when no longer needed. |
| Data Protection Act 2018 (UK) | Implements GDPR in the UK; adds specific provisions for children’s data. | Same practical steps as GDPR; schools must have a clear privacy notice. |
| Children’s Online Privacy Protection Act (COPPA) – US | Requires parental consent before collecting personal information from children under 13. | Useful when using US‑based apps or games. |
| Action | Reason | How to Implement |
|---|---|---|
| Do not share others’ personal details without permission | Prevents identity theft and privacy breaches | Ask for consent; use generic terms (“a friend”) if unsure. |
| Use strong, unique passwords | Reduces risk of account compromise | Combine letters, numbers, symbols; change every 6‑12 months; store in a password manager. |
| Enable two‑factor authentication (2FA) | Adds an extra security layer | Activate in account settings; prefer authenticator apps over SMS. |
| Beware of phishing attempts | Protects against fraud and malware | Check sender address, hover over links, verify URLs before clicking. |
| Delete or archive old posts containing personal info | Limits long‑term exposure | Review timelines regularly; use “delete” or “archive” features. |
| Limit location sharing | Reduces risk of physical stalking | Turn off GPS for apps that don’t need it; avoid posting real‑time whereabouts. |
Year_2025/Science/Physics/Notes).Report20250312v2.docx.SELECT column1, column2 FROM table WHERE condition;INSERT INTO table (col1, col2) VALUES (val1, val2);UPDATE table SET column = value WHERE condition;DELETE FROM table WHERE condition;<!DOCTYPE html><html lang="en">
<head>
<meta charset="UTF-8">
<title>My Page</title>
<link rel="stylesheet" href="styles.css">
</head>
<body>
<h1>Welcome</h1>
<p>Your content here.</p>
</body>
</html>
body {font-family: Arial, sans-serif; line-height: 1.5;}h1 {color: #2A7AE2;}
p {margin-bottom: 1em;}
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources, past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.